Sciweavers

1288 search results - page 14 / 258
» Securing aspect composition
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Enforcing Secure Service Composition
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
IEEESP
2011
12 years 11 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
TAOSD
2010
13 years 6 months ago
A Graph-Based Aspect Interference Detection Approach for UML-Based Aspect-Oriented Models
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
Selim Ciraci, Wilke Havinga, Mehmet Aksit, Christo...
CSFW
1996
IEEE
13 years 12 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
SEKE
2004
Springer
14 years 1 months ago
Applying Aspect-Orientation in Designing Security Systems: A Case Study
As a security policy model evolves, the design of security systems using that model could become increasingly complicated. It is necessary to come up with an approach to guide the ...
Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin...